Results 1 to 10 of about 167,707 (166)

Marek’s Disease Virus (MDV) Meq Oncoprotein Plays Distinct Roles in Tumor Incidence, Distribution, and Size [PDF]

open access: yesViruses
Marek’s disease (MD), characterized by the rapid onset of T-cell lymphomas in chickens, is caused by Mardivirus gallidalpha2, an oncogenic alphaherpesvirus commonly known as Marek’s disease virus (MDV).
Dharani K. Ajithdoss   +3 more
doaj   +2 more sources

Криптоанализ MD5 [PDF]

open access: yesВестник Национального технического университета Харьковский политехнический институт. Серия: Информатика и моделирование, 2005
В статті розглядаються сучасні методи кріптоаналізу хеш-функції MD5 з метою розкриття паролю та підробки цифрового підпису документу. Зроблені висновки відповідно до перспектив кріптоаналізу на сучасному технічному рівні та наведені рекомендації до подальшого використання MD5 з урахуванням знайдених вразливостей.
Гугнин, Владимир Николаевич   +1 more
core   +5 more sources

تحسين خوارزمية MD5 بالاعتماد على عدة طرق

open access: yesمجلة الغري للعلوم الاقتصادية والادارية, 2017
المستخلص خوارزميات Hash  هي الجزء المهم في العديد من تطبيقات التشفير والبروتوكولات الأمنية .  هذا البحث يعمل على تعزيز خوارزميةMD5  ضد بعض الهجمات. التطوير الذي تم اعتماده في تحسين خوارزمية MD5  هو  استخدام DNA coding ، والمعادلات الغير خطية (NLFSR ...
علاء فرحان   +1 more
doaj   +2 more sources

Influence of Training Load on Muscle Contractile Properties in Semi-Professional Female Soccer Players Across a Competitive Microcycle: A Pilot Study [PDF]

open access: yesSensors
This study aimed to evaluate changes in muscle contractile properties during a training microcycle in semi-professional female football players and explore their relationship with training load variables.
Ezequiel Rey   +4 more
doaj   +2 more sources

Improved collision detection of MD5 with additional sufficient conditions

open access: yesElectronic Research Archive, 2022
One application of counter-cryptanalysis is detecting whether a message block is involved in a collision attack, such as the detection of MD5 and SHA-1. Stevens and Shumow speeded up the detection of SHA-1 by introducing unavoidable conditions in message
Linan Fang   +6 more
doaj   +1 more source

An Electro-optical Hybrid Encryption Method based on MD5 Verification

open access: yesGuangtongxin yanjiu, 2022
In view of insufficient security in the next generation passive optical network, an electro-optic hybrid encryption scheme based on MD5 message digest algorithm check is proposed in this paper.
XUAN Ran   +5 more
doaj   +3 more sources

Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13

open access: yesBuana Information Technology and Computer Sciences, 2020
Data security and confidentiality are the most important things that must be considered in information systems. To protect the cryptographic algorithm reliability it uses.
Bayu Priyatna, April Lia Hananto
doaj   +1 more source

Pathogenicity and Pathotype Analysis of Henan Isolates of Marek’s Disease Virus Reveal Long-Term Circulation of Highly Virulent MDV Variant in China

open access: yesViruses, 2022
In recent years, outbreaks of Marek’s disease (MD) have been frequently reported in vaccinated chicken flocks in China. Herein, we have demonstrated that four Marek’s disease virus (MDV) isolates, HN502, HN302, HN304, and HN101, are all pathogenic and ...
Man Teng   +9 more
doaj   +1 more source

PENERAPAN ALGORITMA MESSAGE DIGEST 5 PADA FILE VIDEO

open access: yesJurnal Saintekom, 2020
The use of video documents as one of the media to convey information is very widely used today. Where is evident in some social networking applications contain a lot of content about information in the form of videos.
Rivalri Kristianto Hondro
doaj   +1 more source

Implementasi Enkripsi Data MD5 dan SHA-256 pada Sistem Informasi Peminjaman Buku Tanah

open access: yesTechno.Com, 2023
Setiap lapisan masyarakat harus memperhatikan keamanan sistem informasi untuk menghindari kejahatan dunia maya. Keadaan ini menimbulkan risiko yang harus dikelola untuk melindungi aset dari kejahatan dunia maya.
Hajra Rasmita Ngemba   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy